[1] |
LIU Zi-yuan, MA Zhan-you, LI Xia, GAO Ying-nan, HE Na-na, HUANG Rui-qi.
Fuzzy computation tree logic* model checking based on fuzzy measures
[J]. Computer Engineering & Science, 2024, 46(04): 676-683.
|
[2] |
BAI Xian-ping, YAO Xi-xin, CHEN Xiang-lan, LIU Chong, LI Xi.
An AADL end-to-end flow specification verification method based on timed automata
[J]. Computer Engineering & Science, 2023, 45(05): 810-819.
|
[3] |
LI Zhao-kai, MA Zhan-you, LI Jian-xiang, GUO Hao.
Model checking of fuzzy computation tree logic based on fuzzy decision process
[J]. Computer Engineering & Science, 2022, 44(02): 266-275.
|
[4] |
ZHENG Xiao-yu, LIU Dong-mei, DU Yi-ning, ZHOU Zi-jian, QIU Mei-mei, ZHU Hong.
Verification of pattern driven system security design
[J]. Computer Engineering & Science, 2020, 42(07): 1197-1207.
|
[5] |
YUAN Shen,WEI Jielin,LI Yongming.
Model checking of generalized possibilistic
computation tree logic with multi-valued decision process
[J]. Computer Engineering & Science, 2019, 41(01): 88-97.
|
[6] |
ZHONG Xiaomei,XIAO Meihua,LI Wei,CHEN Jia,LI Yanan.
Formal analysis and improvement of RCIA:
An ultra-lightweight RFID- mutual authentication protocol
[J]. Computer Engineering & Science, 2018, 40(12): 2183-2192.
|
[7] |
WANG Yapeng,LEI Lihui.
Formal verification of gastric adenocarcinoma
core pathway based on CTL model checking
[J]. Computer Engineering & Science, 2018, 40(12): 2280-2286.
|
[8] |
LEI Lihui,GUO Yue,ZHANG Yanbo.
Symbolic CTL model checking based on possibility measure
[J]. Computer Engineering & Science, 2018, 40(11): 2008-2014.
|
[9] |
XIAO Mei-hua1,MEI Ying-tian1,2,LI Wei1,LI Ya-nan1,ZHONG Xiao-mei1,SONG Zi-fan1.
Security analysis of Nayak-T protocol
based on time stamp and private key signature
[J]. Computer Engineering & Science, 2017, 39(12): 2252-2259.
|
[10] |
YUAN Hong-juan1,2,MA Yan-fang3,PAN Hai-yu1,2.
Model checking for fuzzy alternating-time temporal logic
[J]. Computer Engineering & Science, 2017, 39(12): 2290-2296.
|
[11] |
LIN Zhe-chao,DONG Wei.
Implementation and optimization of
LTL probabilistic model checker
[J]. Computer Engineering & Science, 2017, 39(05): 892-896.
|
[12] |
CHENG Daolei,XIAO Meihua,LIU Xinqian,MEI Yingtian,LI Wei.
Analyzing and verifying an open authorization
protocol OAuth 2.0 with SPIN
[J]. J4, 2015, 37(11): 2121-2127.
|
[13] |
MA Zhanyou1,2,LI Yongming1.
Computation tree logic model checking for
generalized possibilistic decision processes
[J]. J4, 2015, 37(11): 2162-2168.
|
[14] |
LIU Jiao,LEI Lihui.
A threevalued logic model checking approach based
on extensional partial Kripke structure
[J]. J4, 2015, 37(10): 1884-1889.
|
[15] |
BAI Haiyang,LI Jing,ZHAO Na.
Schedulability validation of embedded
software model based on time automaton
[J]. J4, 2013, 35(3): 121-127.
|